City: unknown
Region: unknown
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '213.229.69.112 - 213.229.69.127'
% Abuse contact for '213.229.69.112 - 213.229.69.127' is 'abuse@as29550.net'
inetnum: 213.229.69.112 - 213.229.69.127
netname: Poundhost-7052
descr: Poundhost Server
remarks: ##############################################################
remarks: Please report abuse incidents to abuse@as29550.net.
remarks: Messages sent to other contact addresses may not be acted upon.
remarks: ##############################################################
country: GB
admin-c: AO904-RIPE
tech-c: AO904-RIPE
status: ASSIGNED PA
mnt-by: as29550-mnt
created: 2009-08-05T16:12:47Z
last-modified: 2013-02-04T17:11:35Z
source: RIPE
role: AS29550 Operators
address: Simply Transit
address: Unit 2
address: Smallmead Road
address: Reading
address: Berkshire
address: RG2 0QS
remarks: For abuse please contact abuse@as29550.net
phone: +44 (0)1628 777730
admin-c: DD6881-RIPE
admin-c: AJB5-RIPE
tech-c: DD6881-RIPE
tech-c: AJB5-RIPE
mnt-by: AS29550-MNT
nic-hdl: AO904-RIPE
created: 2010-03-25T17:02:11Z
last-modified: 2016-07-21T13:53:37Z
source: RIPE # Filtered
abuse-mailbox: abuse@as29550.net
% Information related to '213.229.64.0/18AS29550'
route: 213.229.64.0/18
descr: Simply Transit Ltd
origin: AS29550
remarks: ***********************************
remarks: * *
remarks: * Abuse: abuse@as29550.net *
remarks: * *
remarks: * Peering: https://www.peeringdb.com/asn/29550 *
remarks: * *
remarks: ***********************************
mnt-by: AS29550-MNT
created: 2009-06-29T12:20:47Z
last-modified: 2016-07-21T14:09:32Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.229.69.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47337
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.229.69.119. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042801 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 04:56:25 CST 2026
;; MSG SIZE rcvd: 107
119.69.229.213.in-addr.arpa domain name pointer rackprime.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
119.69.229.213.in-addr.arpa name = rackprime.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 47.96.91.14 | attack | unauthorized connection attempt |
2020-02-26 13:22:59 |
| 177.154.32.137 | attack | unauthorized connection attempt |
2020-02-26 13:28:45 |
| 45.84.196.75 | attack | SSH login attempts. |
2020-02-26 13:41:20 |
| 154.65.196.144 | attack | unauthorized connection attempt |
2020-02-26 13:29:18 |
| 181.41.69.8 | attackbotsspam | unauthorized connection attempt |
2020-02-26 13:28:05 |
| 103.60.110.210 | attackspam | unauthorized connection attempt |
2020-02-26 13:17:20 |
| 103.227.118.62 | attackspambots | unauthorized connection attempt |
2020-02-26 13:38:17 |
| 167.172.200.163 | attackspambots | unauthorized connection attempt |
2020-02-26 13:08:20 |
| 61.136.101.103 | attackbots | unauthorized connection attempt |
2020-02-26 13:40:43 |
| 223.15.200.101 | attack | unauthorized connection attempt |
2020-02-26 13:00:42 |
| 180.248.74.155 | attackspambots | unauthorized connection attempt |
2020-02-26 13:06:28 |
| 123.215.123.223 | attack | unauthorized connection attempt |
2020-02-26 13:10:21 |
| 79.139.83.5 | attack | unauthorized connection attempt |
2020-02-26 13:20:15 |
| 170.79.83.1 | attackbots | unauthorized connection attempt |
2020-02-26 13:07:57 |
| 218.161.102.52 | attackbots | unauthorized connection attempt |
2020-02-26 13:01:27 |